Aller au contenu
Internal manual — compliance & control

Compliance

Our compliance manual formalizes an operational discipline: governance, evidence, risk prevention, and client transparency. It applies to our four service pillars, proportionate to risk.

Essential clarification
Risk-based

Hipparchus is not a CIF and does not provide CIF services. This manual describes our internal risk-control framework and our interfaces with regulated professionals involved in certain transactions.

Evidence matters

Our manual is designed to be auditable: traceability, approvals, and consistent controls.

This page presents principles and operational safeguards; it is not a legal opinion.

Service pillars

Compliance by design across our 4 pillars

Each service triggers a common baseline (ethics, confidentiality, security, evidence) and, where required, enhanced controls (third parties, flows, operational risk).

Choose a pillar
Principle

Controls intensify with risk: size, complexity, jurisdictions, counterparties, and time pressure.

Structuring, negotiation, coordination

Financing

Evidence first

Stakeholder and flow mapping; economic coherence checks.

Conflict-of-interest management and role separation.

Evidence-based decision file: assumptions, scenarios, supporting docs.

Typical outputs

Memo, option matrix, decision log, stakeholder map, risk notes, final evidence pack.

Control triggers

Complex structures, cross-border elements, unusual flows, secrecy requests, inconsistent documents.

Operating system

The Compliance Cockpit

An internal daily dashboard to run compliance as a system: responsibilities, evidence, controls, incidents, and corrective actions.

Governance

Roles, delegations, periodic reviews, decision register

Ethics

Independence, conflicts, gifts & hospitality, integrity

Confidentiality

Clauses, need-to-know, secure channels, least privilege

AML/CTF (risk-based)

Proportionate vigilance, red flags, escalation, evidence

Data (GDPR)

Purposes, minimization, retention, rights, request handling

Vendors

Assessment, clauses, security, continuity, reversibility

What we measure

Three signals, one objective

Quality of evidence, speed of resolution, and residual risk level — to keep client outcomes predictable.

Evidence
A

Completeness score

Response
≤ 48h

First feedback

Residual risk
Low/Med/High

Risk-based

Metrics are internal and indicative; they guide operational discipline rather than replace professional judgment.

Controls

Control library

Concrete, documented, testable controls. The goal is operational risk reduction and consistently high-quality execution—without unnecessary bureaucracy.

Client & file

Documented
Scoping sheet

Objectives, constraints, horizon, stakeholders, deliverables.

Decision log

Assumptions, options, final choice, evidence.

Version control

Traceable deliverables, validations, approvals.

Third parties

Documented
Identity / authority checks

Proportionate KYB/KYC, UBOs, mandates.

Reputation review

Open sources, coherence checks, alerts, weak signals.

Red-flag screening

Flow inconsistencies, unusual urgency, atypical requests.

Security & data

Documented
Secure channels

Encryption, expiring links, access controls, MFA.

Minimization

Collect only what is needed; reduce exposure surface.

Retention rules

Internal retention/purge, purge evidence.

Quality & incidents

Documented
Second review

Peer review for sensitive deliverables (risk/contract).

Incident register

Qualification, impact, actions, lessons learned.

Business continuity

Priorities, backups, recovery, contact points.

Navigation
  1. AML/CTF
  2. GDPR
  3. Playbook
  4. Official links

The manual is built to minimize ambiguity: what, why, evidence, and escalation paths.

Risk-based safeguards

AML/CTF: a risk-based approach

We apply a risk-based logic: the higher the risk, the stronger the vigilance, documentation, and controls. When obliged entities are involved, their legal obligations prevail and our diligence aligns with that standard.

When to enhance vigilance?

Unusual amounts, complex structures, pressure to rush, flow inconsistencies, difficulty identifying UBOs, multi-jurisdiction counterparties.

Evidence and escalation

A weak signal is not an accusation: it triggers verification. The manual requires internal escalation, factual documentation, and, if relevant, coordination with obliged actors.

Official references

French law sets out obliged entities and the AML/CTF corpus; ACPR/Tracfin joint guidelines frame vigilance and reporting for relevant sectors.

When applicable, reporting duties (e.g., suspicious activity reporting) are handled by the obliged entities according to their legal framework.

Data governance

Data protection (GDPR)

The manual governs collection and use of data: explicit purposes, minimization, security, retention, and handling of requests (access, rectification, erasure, objection). If issues persist, CNIL is the reference authority.

Purpose

Only for defined objectives.

Minimization

Collect the necessary minimum.

Retention

Defined rules and purge evidence.

CNIL typically requires that you first contact the organization before lodging a complaint.

Execution discipline

Operational playbook

A standardized sequence designed to be client-readable and auditable: what we do, in which order, and with what evidence.

  1. 01
    Scope

    Perimeter, objectives, constraints, stakeholders, timeline, deliverables.

  2. 02
    Diagnose

    Minimal collection, analysis, assumptions, risk points.

  3. 03
    Structure

    Scenarios, contractual architecture, responsibilities, action plan.

  4. 04
    Control

    Checks, flow coherence, third-party review, second review if needed.

  5. 05
    Decide

    Argued conclusion, limits, recorded decisions.

  6. 06
    Evidence

    Final file: docs, validations, versioning, retention/purge.

Transparency and remedies

A compliance question?

We answer with evidence. For a precise request, provide context, objective, and available documents.

Contact Us

Get in touch

Describe your need in a few lines. We will revert with clear framing, a method, and next steps.

Consultant
M. Baptiste DEHAY
View GDPR policy